Closings

Severe Weather

Keep your computer, mobile device safe

Computer security firm McAfee says online attacks are on the rise, especially for mobile devices. This slideshow runs down some tips you can follow to make sure your computer and phone remain secure.

A special agent in the FBI's Cyber Division offers the following tips to protect your computer from intrusion...

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates or make sure your computer is scheduled to update automatically to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker's connection—be it spyware or a botnet that employs your computer's resources to reach out to other unwitting users.

The following tips are aimed at mobile devices.

Download only trusted applications: Download apps from trusted sources or marketplaces that have positive reviews and feedback. If you have an iPhone, go to the iTunes store. If you have an Android device, use the Android Market or Google Play. You should not download apps from online forums or via e-mail solicitaitons.

Be suspicious of unknown links or requests sent through email or text message: Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.

Access the Internet over a secure network: Only browse the web through your service provider’s network (e.g., 3G) or a secure Wi-Fi network.

Be vigilant about online security: Keep anti-virus and malware software up to date, use varying and strong passwords, and never provide your personal or financial information without knowing who’s asking and why they need it.

Vary your passwords: You should not use the same username and password for different online accounts. If one of them is corrupted, then a hacker could gain access to all other accounts. It can be tough to juggle a lot of different usernames and passwords, but you may be glad you made the effort if one of your accounts is compromised.

Passcode protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.

Review and understand the permissions you are giving when you download applications.

If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.

Smartphones require updates to run applications and firmware. If users neglect this it increases the risk of having their device hacked or compromised.

Comments

The views expressed are not those of this site, this station or its affiliated companies. By posting your comments you agree to accept our terms of use.